What you need to know about the Duqu threat

November 2011 Security Services & Risk Management, Information Security

According to researchers at Symantec Security Response, this new malicious program has been developed to steal the kind of information needed to mount another Stuxnet-like attack. Here are the latest details.

On 19 October 19, Symantec released its analysis of a new threat, called Duqu, that appears to be the precursor to a future, Stuxnet-like attack. Parts of Duqu are nearly identical to the Stuxnet worm, but its sole purpose is to gather intelligence that could be used to give attackers the insight they need to mount future attacks. Duqu is not widespread, but it is highly targeted at suppliers to industrial facilities.

In at least one targeted organisation, Symantec has confirmed that the installer file was a Microsoft Word document, which exploited a previously unknown kernel vulnerability that allows code execution. When the document was opened, malicious code executed and installed the main Duqu binaries. Microsoft is aware of the vulnerability, and is working on issuing a patch and an advisory.

Duqu was recovered from a limited group of organisations based in Europe and first analysed by the Laboratory of Cryptography and System Security in Budapest.

How it works

Where Stuxnet was designed to reprogram industrial control systems (hardware used to manage industrial environments such as power plants and oil refineries), attackers have used Duqu to install keystroke loggers to gather information from the infected computers.

Although Duqu uses some of the same source code as Stuxnet, its payload is not destructive. It is primarily a remote access Trojan that does not self-replicate in order to spread itself, which means it is not a worm. Two variants of the threat were initially recovered, although Symantec has since discovered additional variants.

Duqu consists of an installer, a driver file, a main DLL, and a configuration file. Like Stuxnet, Duqu masks itself as legitimate code using a driver file signed with a valid digital certificate. The certificate, which belongs to a company headquartered in Taipei, was revoked on 14 October.

Attacks using Duqu and its variants may have been going on since last December based on a review of file-compilation times, according to Symantec.

Duqu uses HTTP and HTTPS to communicate with two known command-and-control (C&C) servers that are both now inactive. Attackers were able to download additional executables through the C&C servers, including an infostealer that can perform actions such as enumerating the network, recording keystrokes and gathering system information. The information is logged to a lightly encrypted and compressed local file, which is then exported.

The threat uses a custom C&C protocol, primarily downloading or uploading what appear to be JPG files. However, in addition to transferring JPG files, other data is encrypted and sent out. Duqu is configured to run for 30 or 36 days, at which point it will automatically remove itself from a system.

So far, Duqu infections have been confirmed in at least six organisations in eight countries (France, the Netherlands, Switzerland, the Ukraine, India, Iran, Sudan, and Vietnam).

Protect your private keys

The investigation by Symantec researchers concluded that some of the files associated with Duqu were signed with a private key stolen from an organisation, whose systems appear to have been compromised. The private key was associated with the code-signing certificate issued to that customer.

While it is not known how this particular key was compromised, Symantec offers the following recommendations to better protect private keys:

Separate test signing and release signing. It is a best practice to set up a parallel code-signing infrastructure using test certificates generated by an internal test root certificate authority. This ensures that business-critical private certificates used to sign officially released software are not stored on insecure build systems used for routine R&D software development tasks, reducing the likelihood that they will be compromised.

Cryptographic hardware modules. Keys stored in software on general-purpose computers are susceptible to compromise. It is more secure, and a best practice, to store keys in secure, tamper-proof, cryptographic hardware devices.

Physical security. There is no security without physical security. If it is possible for an outsider, or a malicious insider, to gain access to code-signing keys, then all cryptography measures are for naught. Cameras, guards, fingerprint scanners, and additional measures are all appropriate to protect critical assets and should be taken seriously.

Stuxnet opened the door to malware having profound political and social ramifications. While there is still much to be learned from the complexity of this threat, Stuxnet has already changed the way researchers approach malware and view the security threat landscape. The story continues now with Duqu, a new threat whose goal is to gather the intelligence that attackers need to mount a future, Stuxnet-like attack.

For a comprehensive technical analysis of this latest threat, download the Symantec Security Response White Paper: W32.Duqu: The precursor to the next Stuxnet





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Risk management and compliance enforcement
Security Services & Risk Management
Having a risk management and compliance programme (RMCP) is not just a procedural formality; it is a legal requirement under Section 42 of the Financial Intelligence Centre Act (FICA).

Read more...
The dangers of poor-quality solar cables
Security Services & Risk Management Smart Home Automation
Reports indicate that one in six fires attended by South African firefighters is linked to substandard solar installations, often due to faulty wiring or incompatible components.

Read more...
Growing risks for employers
Security Services & Risk Management
With South Africa’s unemployment rate exceeding 32% and expected to rise beyond 33% this year, desperation is fuelling deception in the job market. Trust is no longer a given, it is a gamble.

Read more...
Chubbsafes celebrates 190 years
Gunnebo Safe Storage Africa News & Events Security Services & Risk Management
Chubbsafes marks its 190th anniversary in 2025 and as a highlight of the anniversary celebrations it is launching the Chubbsafes 1835, a limited edition 190th-anniversary collector’s safe.

Read more...
New law enforcement request portal
News & Events Security Services & Risk Management
inDrive launches law enforcement request portal in South Africa to support safety investigations. New portal allows authorised South African law enforcement officials to securely request user data related to safety incidents.

Read more...
Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
Growing risks for employers
Security Services & Risk Management
With South Africa’s unemployment rate exceeding 32% and expected to rise beyond 33% this year, desperation is fuelling deception in the job market. Trust is no longer a given, it’s a gamble.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.